cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
RETRACTED: A Blind Carrier Frequency Offset Estimation Scheme for OFDM Systems via Hybrid-ICA Algorithm Amin Jalili; Mehdi Chehel Amirani; Saied Balaneshin Kordan
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 5: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.653 KB)

Abstract

This article has been retracted: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal). This article has been retracted by agreement between the author and the Editor-in-Chief. A request by the author to update the paper after publication resulted in an agreement to retract the paper by the Author and Editor-in-Chief. -------------------- This paper addresses a new iterative blind carrier frequency offset (CFO) estimator in orthogonal frequency-division multiplexing (OFDM) systems. In our scenario, relying on a hybrid independent component analysis (ICA) scheme, a blind frequency offset estimator is proposed for OFDM systems employing single antenna. The proposed estimator is a combination of the fast fixed-point ICA (FastICA) algorithm and the natural-gradient ICA algorithm, which inherits the fast convergence and high accuracy of theses algorithms, respectively. As a major advantage, the proposed estimator works in an efficient way in practical high-data-rate OFDM systems especially with large number of subcarriers. To demonstrate the efficiency of our proposed algorithm, numerical results are provided from computer simulations and comparisons are made with other existing CFO estimators in the literature. It is shown that by applying our proposed algorithm, the normalized mean-square error of the CFO estimator is decreased to a high extent. DOI:http://dx.doi.org/10.11591/ijece.v4i5.6533
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network Jyoti Metan; K N Narashinha Murthy
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.169 KB) | DOI: 10.11591/ijece.v9i4.pp2682-2690

Abstract

Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
Evaluation of the Energy Performance of the Amougdoul Wind Farm, Morocco Asma Ezzaidi; Mustapha Elyaqouti; Lahoussine Bouhouch; Ahmed Ihlal
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (692.326 KB) | DOI: 10.11591/ijece.v7i2.pp692-705

Abstract

This paper is concerned with the assessment of the the performance of the Amougdoul wind farm. We have determined the Weibull parameters; namely the scale parameter, c (m/s) and shape parameter, k. After that, we have estimated energy output by a wind turbine using two techniques: the useful power calculation method and the method based on the modeling of the power curve, which is respectively 134.5 kW and 194.19 KW corresponding to 27% and 39% of the available wind energy, which confirm that the conversion efficiency does not exceed 40%.
A Miniature Microstrip Antenna Array using Circular Shaped Dumbbell for ISM Band Applications Ahmed Ghaloua; Jamal Zbitou; Larbi El Abdellaoui; Mohamed Latrach; Ahmed Errkik; Abdelali Tajmouati
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (528.315 KB) | DOI: 10.11591/ijece.v8i5.pp3793-3800

Abstract

The aim of this work is the achievement, and the validation of a small microstrip patch antenna array using a circular shaped dumbbell defected ground structure. This work has been dividing into two stages: The first step is to miniaturize a microstrip patch antenna resonating at 5.8GHz, which operate in the Industrial Scientific Medical band (ISM) and the second is to use a circular defected ground structure to shift the resonance frequency of the antenna array from 5.8GHz to 2.45GHz. At last, a miniaturization up to 74.47%, relative to the original microstrip antenna array has accomplished. The antenna structure has designed, optimized and miniaturized using CST MW Studio. The obtained results have compared with Ansoft’s HFSS electromagnetic solver. The antenna array has fabricated on FR-4 substrate, and its reflection coefficient is measured.
Security framework for cloud based electronic health record (EHR) system Raghavendra Ganiga; Radhika M. Pai; Manohara Pai M. M.; Rajesh Kumar Sinha
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (662.468 KB) | DOI: 10.11591/ijece.v10i1.pp455-466

Abstract

Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper charts have now become easier to organize and maintain, thereby increasing the efficiency of medical staff. The Electronic Health Records (EHR) System is becoming a high-tech medical management technology developed for the economic or emerging economic countries like India. In a national health system, the EHR integrates the Electronic Medical Records (EMR) in all collaborating hospitals through different networks. EHR gives healthcare professionals a way to share and manage patient data quickly and effectively. Due to the mass storage of confidential patient data, healthcare organizations are considered as one of the most targeted sectors by intruders. This paper proposes a security framework for EHR system, which takes into consideration the integrity, availability, and confidentiality of health records. The threats posed to the EHR system are modeled by STRIDE modeling tool, and the amount of risk is calculated using DREAD. The paper also suggests the security mechanism and countermeasures based on security standards, which can be utilized in an EHR environment. The paper shows that the utilization of the proposed methods effectively addresses security concerns such as breach of sensitive medical information.
Network Reconfiguration of Primary Distribution System Using GWO Algorithm A. V. Sudhakara Reddy; M. Damodar Reddy; M. Satish Kumar Reddy
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.829 KB) | DOI: 10.11591/ijece.v7i6.pp3226-3234

Abstract

This manuscript presents a feeder reconfiguration in primary distribution networks with an objective of minimizing the real power loss or maximization of power loss reduction. An optimal switching for the network reconfiguration problem is introduced in this article based on step by step switching and simultaneous switching. This paper proposes a Grey Wolf Optimization (GWO) algorithm to solve the feeder reconfiguration problem through fitness function corresponding to optimum combination of switches in power distribution systems. The objective function is formulated to solve the reconfiguration problem which includes minimization of real power loss. A nature inspired Grey Wolf Optimization Algorithm is utilized to restructure the power distribution system and identify the optimal switches corresponding minimum power loss in the distribution network. The GWO technique has tested on standard IEEE 33-bus and 69-bus systems and the results are presented.
Speaker specific feature based clustering and its applications in language independent forensic speaker recognition Satyanand Singh; Pragya Singh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (901.278 KB) | DOI: 10.11591/ijece.v10i4.pp3508-3518

Abstract

Forensic speaker recognition (FSR) is the process of determining whether the source of a questioned voice recording (trace) is a specific individual (suspected speaker). The role of the forensic expert is to testify by using, if possible, a quantitative measure of this value to the value of the voice evidence. Using this information as an aid in their judgments and decisions are up to the judge and/or the jury. Most existing methods measure inter-utterance similarities directly based on spectrum-based characteristics, the resulting clusters may not be well related to speaker’s, but rather to different acoustic classes. This research addresses this deficiency by projecting language-independent utterances into a reference space equipped to cover the standard voice features underlying the entire utterance set. The resulting projection vectors naturally represent the language-independent voice-like relationships among all the utterances and are therefore more robust against non-speaker interference. Then a clustering approach is proposed based on the peak approximation in order to maximize the similarities between language-independent utterances within all clusters. This method uses a K-medoid, Fuzzy C-means, Gustafson and Kessel and Gath-Geva algorithm to evaluate the cluster to which each utterance should be allocated, overcoming the disadvantage of traditional hierarchical clustering that the ultimate outcome can only hit the optimum recognition efficiency. The recognition efficiency of K-medoid, Fuzzy C-means, Gustafson and Kessel and Gath-Geva clustering algorithms are 95.2%, 97.3%, 98.5% and 99.7% and EER are 3.62%, 2.91 %, 2.82%, and 2.61% respectively. The EER improvement of the Gath-Geva technique based FSRsystem compared with Gustafson and Kessel and Fuzzy C-means is 8.04% and 11.49% respectively
Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication Abiodun Esther Omolara; Aman Jantan; Oludare Isaac Abiodun; Humaira Arshad; Nachaat AbdElatif Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (499.974 KB) | DOI: 10.11591/ijece.v9i3.pp1879-1886

Abstract

The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication mechanism employs the traditional password-based authentication system which fails to curb these attacks. This paper addresses this problem using the FingerEye. The FingerEye is a robust system integrated with iris-scan authentication. A customer’s profile is created at registration where the pattern in his iris is analyzed and converted into binary codes. The binary codes are then stored in the bank database and are required for verification prior to any transaction. We leverage on the iris because every user has unique eyes which do not change until death and even a blind person with iris can be authenticated too. We implemented and tested the proposed system using CIMB bank, Malaysia as case study. The FingerEye is integrated with the current infrastructure employed by the bank and as such, no extra cost was incurred. Our result demonstrates that ATM attacks become impractical. Moreover, transactions were executed faster from 6.5 seconds to 1.4 seconds.
Alert Correlation through a Multi Components Architecture Saeid Dadkhah; M. R. KhaliliShoja; Hassan Taheri
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 4: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.342 KB)

Abstract

Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detection systems, reduces nonrelevant ones, groups together alerts based on similarity and causality relationships between them and finally makes aconcise and meaningful view of occurring or attempted intrusions. Unfortunately, most correlation approaches use just a few components that aim only specific correlation issues and so cause reduction in correlation rate. This paper uses a general correlation model that has already been presented in [9] and is consisted of a comprehensive set of components. Then some changes are applied in the component that is related to multi-step attack scenario to detect them better and so to improve semantic level of alerts. The results of experiments with DARPA 2000 data set obviously show the effectiveness of the proposed approach.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2771
Clutter Reduction in Parallel Coordinates using Binning Approach for Improved Visualization Swathy Sunil Kumar; Teenu Krishnan; Sreeja Ashok; M.V. Judy
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (207.283 KB) | DOI: 10.11591/ijece.v5i6.pp1564-1568

Abstract

As the data and number of information sources keeps on mounting, the mining of necessary information and their presentation in a human delicate form becomes a great challenge. Visualization helps us to pictorially represent, evaluate and uncover the knowledge from the data under consideration. Data visualization offers its immense opportunity in the fields of trade, banking, finance, insurance, energy etc. With the data explosion in various fields, there is a large importance for visualization techniques. But when the quantity of data becomes elevated, the visualization methods may take away the competency. Parallel coordinates is an eminent and often used method for data visualization. However the efficiency of this method will be abridged if there are large amount of instances in the dataset, thereby making the visualization clumsier and the data retrieval very inefficient. Here we introduced a data summarization approach as a preprocessing step to the existing parallel coordinate method to make the visualization more proficient.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue